Joshua A. Kroll

Orcid: 0000-0002-4079-2175

According to our database1, Joshua A. Kroll authored at least 17 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mitigating Inference Risks with the NIST Privacy Framework.
Proc. Priv. Enhancing Technol., January, 2024

2023
Accountable Software Systems (Dagstuhl Seminar 23411).
Dagstuhl Reports, 2023

Concrete Safety for ML Problems: System Safety for ML Development and Assessment.
CoRR, 2023

From Plane Crashes to Algorithmic Harm: Applicability of Safety Engineering Frameworks for Responsible ML.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
System Safety Engineering for Social and Ethical ML Risks: A Case Study.
CoRR, 2022

2021
Lessons Learned From Applying the NIST Privacy Framework.
IT Prof., 2021

Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks.
Computer, 2021

Outlining Traceability: A Principle for Operationalizing Accountability in Computing Systems.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

2019
This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology.
Proc. ACM Hum. Comput. Interact., 2019

Privacy and Policy in Polystores: A Data Management Research Agenda.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Data Science Data Governance [AI Ethics].
IEEE Secur. Priv., 2018

2015
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Security Audit of Safeplug "Tor in a Box".
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

Portable Software Fault Isolation.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014


  Loading...